[GIT PULL] ksmbd server fixes

From: Steve French
Date: Wed Dec 14 2022 - 22:18:33 EST


Please pull the following changes since commit
76dcd734eca23168cb008912c0f69ff408905235:

Linux 6.1-rc8 (2022-12-04 14:48:12 -0800)

are available in the Git repository at:

git://git.samba.org/ksmbd.git tags/6.2-rc-ksmbd-server-fixes

for you to fetch changes up to 72ee45fd46d0d3578c4e6046f66fae3218543ce3:

ksmbd: Convert to use sysfs_emit()/sysfs_emit_at() APIs (2022-12-11
08:33:32 -0600)

Note that this P/R includes one commit ("ksmbd: replace
one-element arrays with flexible-array members") which you just merged
from a different unrelated P/R a few days ago. Let me know if you
want me to rebase the ksmbd tree and resend the server P/R.

I can also send the client (cifs.ko) P/R tomorrow if it is easier but
have been working on testing some important fixes which are not in
linux-next yet, so not sure if it is easier to send the client fixes
as two P/Rs, or wait and send the client fixes all together as one
P/R later in the merge window.

----------------------------------------------------------------
six ksmbd server fixes:
- two resource leak fixes
- two cleanup
- a file unlock fix
- a fix for configuring packet encryption properly

----------------------------------------------------------------
Gustavo A. R. Silva (1):
ksmbd: replace one-element arrays with flexible-array members

Jeff Layton (1):
ksmbd: use F_SETLK when unlocking a file

Marios Makassikis (1):
ksmbd: Fix resource leak in smb2_lock()

Namjae Jeon (1):
ksmbd: set SMB2_SESSION_FLAG_ENCRYPT_DATA when enforcing data
encryption for this share

Xiu Jianfeng (1):
ksmbd: Fix resource leak in ksmbd_session_rpc_open()

ye xingchen (1):
ksmbd: Convert to use sysfs_emit()/sysfs_emit_at() APIs

fs/ksmbd/ksmbd_netlink.h | 1 +
fs/ksmbd/mgmt/user_session.c | 8 +++++---
fs/ksmbd/server.c | 20 ++++++--------------
fs/ksmbd/smb2ops.c | 10 ++++++++--
fs/ksmbd/smb2pdu.c | 20 +++++++++++++-------
fs/ksmbd/smb2pdu.h | 2 +-
fs/ksmbd/smb_common.h | 12 ++++++------
7 files changed, 40 insertions(+), 33 deletions(-)

--
Thanks,

Steve